First published: Wed Nov 13 2019(Updated: )
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-server | <3.13.0.175.186 | 3.13.0.175.186 |
=14.04 | ||
All of | ||
ubuntu/linux-image-3.13.0-175-generic | <3.13.0-175.226 | 3.13.0-175.226 |
=14.04 | ||
All of | ||
ubuntu/linux-image-3.13.0-175-lowlatency | <3.13.0-175.226 | 3.13.0-175.226 |
=14.04 | ||
All of | ||
ubuntu/linux-image-virtual | <3.13.0.175.186 | 3.13.0.175.186 |
=14.04 | ||
All of | ||
ubuntu/linux-image-3.13.0-175-generic-lpae | <3.13.0-175.226 | 3.13.0-175.226 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic | <3.13.0.175.186 | 3.13.0.175.186 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <3.13.0.175.186 | 3.13.0.175.186 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <3.13.0.175.186 | 3.13.0.175.186 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of USN-4187-1 is CVE-2019-11135.
The severity of the USN-4187-1 vulnerability is not specified.
The affected software versions are Linux kernels 3.13.0.175.186, 3.13.0-175.226, and 3.13.0.175.186.
To fix the USN-4187-1 vulnerability, update your Linux kernel to version 3.13.0.175.186 or later.
You can find more information about USN-4187-1 on the Ubuntu Security Notices page.